DELL 9.8(0.0) User Manual

Page of 1910
Usage 
Information
This command creates a crypto policy entry and enters the crypto policy 
configuration mode for configuring the flow parameters.
Example
Dell(conf)#crypto ipsec policy West 10 ipsec-manual
Dell(conf-crypto-policy)#
management crypto-policy
Apply the crypto policy to management traffic.
S4820T
Syntax
management crypto-policy name
To remove the management traffic crypto policy, use the no management 
crypto-policy name command.
Parameters
name
Enter the name for the crypto policy..
Defaults
none
Command 
Modes
CONFIGURATION
Command 
History
This guide is platform-specific. For command information about other platforms, 
refer to the relevant Dell Networking OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command.
Version
Description
9.2(0.2)
Introduced on the Z9000, S4810, and S4820T.
match
Apply an match filter to the crypto policy.
S4820T
Syntax
match seq-num tcp [sourceip address | ipv6 address {mask
{source-port number}] [destination ip address | ipv6 address 
{mask} {destination-port number}]
To remove the match filter for the crypto map, use the no match seq-num tcp 
[source ip address | ipv6 address {mask} {source-port number}] 
Internet Protocol Security (IPSec)
885